Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Brigham Young University

2018

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 93

Full-Text Articles in Physical Sciences and Mathematics

Fine-Grained Topic Models Using Anchor Words, Jeffrey A. Lund Dec 2018

Fine-Grained Topic Models Using Anchor Words, Jeffrey A. Lund

Theses and Dissertations

Topic modeling is an effective tool for analyzing the thematic content of large collections of text. However, traditional probabilistic topic modeling is limited to a small number of topics (typically no more than hundreds). We introduce fine-grained topic models, which have large numbers of nuanced and specific topics. We demonstrate that fine-grained topic models enable use cases not currently possible with current topic modeling techniques, including an automatic cross-referencing task in which short passages of text are linked to other topically related passages. We do so by leveraging anchor methods, a recent class of topic model based on non-negative matrix …


Evaluating An Educational Cybersecurity Playable Case Study, Tanner West Johnson Dec 2018

Evaluating An Educational Cybersecurity Playable Case Study, Tanner West Johnson

Theses and Dissertations

The realities of cyberattacks have become more and more prevalent in the world today. Due to the growing number of these attacks, the need for highly trained individuals has also increased. Because of a shortage of qualified candidates for these positions, there is an increasing need for cybersecurity education within high schools and universities. In this thesis, I discuss the development and evaluation of Cybermatics, an educational simulation, or playable case study, designed to help students learn and develop skills within the cybersecurity discipline.

This playable case study was designed to allow students to gain an understanding of the field …


Designing Cybersecurity Competitions In The Cloud: A Framework And Feasibility Study, Chandler Ryan Newby Dec 2018

Designing Cybersecurity Competitions In The Cloud: A Framework And Feasibility Study, Chandler Ryan Newby

Theses and Dissertations

Cybersecurity is an ever-expanding field. In order to stay current, training, development, and constant learning are necessary. One of these training methods has historically been competitions. Cybersecurity competitions provide a method for competitors to experience firsthand cybersecurity concepts and situations. These experiences can help build interest in, and improve skills in, cybersecurity.

While there are diverse types of cybersecurity competitions, most are run with on-premise hardware, often centralized at a specific location, and are usually limited in scope by available hardware. This research focuses on the possibility of running cybersecurity competitions, specifically CCDC style competitions, in a public cloud environment. …


Nonlinear Optical Characterization Of Solids, Alex Farnsworth Dec 2018

Nonlinear Optical Characterization Of Solids, Alex Farnsworth

Undergraduate Honors Theses

Vibrational Sum Frequency Generation (VSFG) and the similar Second Harmonic Generation (SHG) are both classified as nonlinear optical phenomena, with the hallmark trait being that the input and output frequencies are different. Both of these systems are remarkable tools due to their surface specific nature. Still, there is much that is not known about the response from these systems, especially the nonresonant SFG response. We have worked to better understand SFG signal, specifically the nonresonant temporal profile. We have also collected results that call into question some underlying assumptions about time-based suppression methods when working with single crystal substrates.

As …


User Attitudes About Duo Two-Factor Authentication At Byu, Jonathan Dutson Dec 2018

User Attitudes About Duo Two-Factor Authentication At Byu, Jonathan Dutson

Undergraduate Honors Theses

Simple password-based authentication provides insufficient protection against increasingly common incidents of online identity theft and data loss. Although two-factor authentication (2FA) provides users with increased protection against attackers, users have mixed feelings about the usability of 2FA. We surveyed the students, faculty, and staff of Brigham Young University (BYU) to measure user sentiment about DUO Security, the 2FA system adopted by BYU in 2017. We find that most users consider DUO to be annoying, and about half of those surveyed expressed a preference for authentication without using a second-factor. About half of all participants reported at least one instance of …


Security Analysis And Recommendations For Coniks As A Pki Solution For Mobile Apps, George Bradley Spendlove Dec 2018

Security Analysis And Recommendations For Coniks As A Pki Solution For Mobile Apps, George Bradley Spendlove

Theses and Dissertations

Secure mobile apps, including end-to-end encrypted messaging apps such as Whats-App and Signal, are increasingly popular today. These apps require trust in a centralized key directory to automatically exchange the public keys used to secure user communication. This trust may be abused by malicious, subpoenaed, or compromised directories. A public key infrastructure (PKI) solution that requires less trust would increase the security of these commonly used apps.CONIKS is a recent PKI proposal that features transparent key directories which publish auditable digests of the public keys they present to queriers. By monitoring its key every time a new digest is published, …


Improving The Quality Of Neural Machine Translation Using Terminology Injection, Duane K. Dougal Dec 2018

Improving The Quality Of Neural Machine Translation Using Terminology Injection, Duane K. Dougal

Theses and Dissertations

Most organizations use an increasing number of domain- or organization-specific words and phrases. A translation process, whether human or automated, must also be able to accurately and efficiently use these specific multilingual terminology collections. However, comparatively little has been done to explore the use of vetted terminology as an input to machine translation (MT) for improved results. In fact, no single established process currently exists to integrate terminology into MT as a general practice, and especially no established process for neural machine translation (NMT) exists to ensure that the translation of individual terms is consistent with an approved terminology collection. …


Endocytosis As An Additional Mechanism Of Glucose Transport To The Hexose Transporter In Trypanosoma Brucei, Jongsu Choi Dec 2018

Endocytosis As An Additional Mechanism Of Glucose Transport To The Hexose Transporter In Trypanosoma Brucei, Jongsu Choi

Theses and Dissertations

Trypanosoma brucei is an extracellular kineotoplastid parasite that causes human African trypanosomiasis (HAT), also known as sleeping sickness. As trypanosomes undergo vector to host transition, heavy transcriptional adaptation such as metabolic shift to glycolysis and upregulated endocytosis occurs. Specifically, glycolysis in the infectious stage becomes the sole source of energy production; thus, the glucose transport mechanism in T. brucei provides one of the most promising therapeutic targets for development of new drugs to treat HAT. Despite an established trypanosome hexose transporter (THT) model for glucose transport across the plasma membrane, there remains gaps in the detailed mechanism of glucose transport …


The Use Of Tissue And Serum ”˜Omics' Methods To Characterize Disease, Ying Ding Dec 2018

The Use Of Tissue And Serum ”˜Omics' Methods To Characterize Disease, Ying Ding

Theses and Dissertations

Preeclampsia (PE) is a multisystem disorder that contributes to maternal and fetal mortality and morbidity worldwide. It is characterized by de-novo hypertension and proteinuria or other maternal organ damage after 20 weeks of gestation. Evidence suggested that endogenous digitalis-like factor (EDLF) contributes to the pathogenesis of PE, and that the potential source of EDLF is the placenta. EDLF can inhibit the sodium pump (SP) specifically and may lead to hypertension, it has also been associated with hypoxia, oxidative stress and other abnormalitites present in PE.We studied whether normal human placenta responded to SP inhibition casued by EDLF with a change …


Flow Adaptive Video Object Segmentation, Fanqing Lin Dec 2018

Flow Adaptive Video Object Segmentation, Fanqing Lin

Theses and Dissertations

We tackle the task of semi-supervised video object segmentation, i.e, pixel-level object classification of the images in video sequences using very limited ground truth training data of its corresponding video. Recently introduced online adaptation of convolutional neural networks for video object segmentation (OnAVOS) has achieved good results by pretraining the network, fine-tuning on the first frame and training the network at test time using its approximate prediction as newly obtained ground truth. We propose Flow Adaptive Video Object Segmentation (FAVOS) that refines the generated adaptive ground truth for online updates and utilizes temporal consistency between video frames with the help …


Usable Security And Privacy For Secure Messaging Applications, Elham Vaziripour Dec 2018

Usable Security And Privacy For Secure Messaging Applications, Elham Vaziripour

Theses and Dissertations

The threat of government and corporate surveillance around the world, as well as the publicity surrounding major cybersecurity attacks, have increased interest in secure and private end-to-end communications. In response to this demand, numerous secure messaging applications have been developed in recent years. These applications have been welcomed and publically used not just by political activists and journalists but by everyday users as well. Most of these popular secure messaging applications are usable because they hide many of the details of how encryption is provided. The strength of the security properties of these applications relies on the authentication ceremony, wherein …


Penetration Depth Variation In Atomic Layer Deposition On Multiwalled Carbon Nanotube Forests, David Alan Kane Dec 2018

Penetration Depth Variation In Atomic Layer Deposition On Multiwalled Carbon Nanotube Forests, David Alan Kane

Theses and Dissertations

Atomic Layer Deposition (ALD) of Al2O3 on tall multiwalled carbon nanotube forests shows concentration variation with the depth in the form of discrete steps. While ALD is capable of extremely conformal deposition in high aspect ratio structures, decreasing penetration depth has been observed over multiple thermal ALD cycles on 1.3 mm tall multiwalled carbon nanotube forests. SEM imaging with Energy Dispersive X-ray Spectroscopy elemental analysis shows steps of decreasing intensity corresponding to decreasing concentrations of Al2O3. A study of these steps suggests that they are produced by a combination of diffusion limited delivery of precursors with increasing precursor adsorption site …


Discovery Of Paleotsunami Deposits Along Eastern Sunda Arc: Potential For Megathrust Earthquakes In Bali, Hanif Ibadurrahman Sulaeman Dec 2018

Discovery Of Paleotsunami Deposits Along Eastern Sunda Arc: Potential For Megathrust Earthquakes In Bali, Hanif Ibadurrahman Sulaeman

Theses and Dissertations

Several laterally extensive candidate tsunami deposits are preserved along coastlines facing the eastern Java Trench, indicating it has experienced mega-thrust earthquakes in the past. We investigated 37 coastal sites in Bali, Lombok, Sumba and Timor islands, many of which preserve course sand and pebble layers that overlie sharp basal contacts with scour marks into the mud, fine upward in grain size, and have bimodal grain size distributions. Other unique features are the common occurrence of marine fossils and concentrations of heavy minerals. The occurrence of these high-energy deposits interlayered with clay-rich units indicates the coarse clastics are anomalous because they …


Discovery Of Paleotsunami Deposits Along Eastern Sunda Arc: Potential For Megathrust Earthquakes In Bali, Hanif Ibadurrahman Sulaeman Dec 2018

Discovery Of Paleotsunami Deposits Along Eastern Sunda Arc: Potential For Megathrust Earthquakes In Bali, Hanif Ibadurrahman Sulaeman

Theses and Dissertations

Several laterally extensive candidate tsunami deposits are preserved along coastlines facing the eastern Java Trench, indicating it has experienced mega-thrust earthquakes in the past. We investigated 37 coastal sites in Bali, Lombok, Sumba and Timor islands, many of which preserve course sand and pebble layers that overlie sharp basal contacts with scour marks into the mud, fine upward in grain size, and have bimodal grain size distributions. Other unique features are the common occurrence of marine fossils and concentrations of heavy minerals. The occurrence of these high-energy deposits interlayered with clay-rich units indicates the coarse clastics are anomalous because they …


Cake Cam: Take Your Photo And Be In It Too, Candice Lynn Davis Dec 2018

Cake Cam: Take Your Photo And Be In It Too, Candice Lynn Davis

Theses and Dissertations

In this thesis we explore a different kind of computer-mediated collaboration (CMC) in which two people collaborate to perform a single task in a time-sensitive asymmetric situation wherein one person is more invested in the outcome than the other is. Our conjecture is that interactive computing can quickly communicate intent, which may help mediate time-sensitive asymmetric tasks between two people. We explore this idea specifically in the context of asking a stranger to take one's picture at a tourist site. Consider a tourist handing a cell phone to a complete stranger and asking the stranger to take the tourist's picture …


Normally Supportive Sublattices Of Crystallographic Space Groups, Miles A. Clemens Dec 2018

Normally Supportive Sublattices Of Crystallographic Space Groups, Miles A. Clemens

Theses and Dissertations

Normal subgroups can be thought of as the primary building blocks for decomposing mathematicalgroups into quotient groups. The properties of the resulting quotient groups are oftenused to determine properties of the group itself. This thesis considers normal subgroups of threedimensionalcrystallographic space groups that are themselves three-dimensional crystallographicspace groups; for convenience, we refer to such a subgroup as a csg-normal subgroup. We identifypractical restrictions on csg-normal subgroups that facilitate their tabulation. First, the point groupof an csg-normal subgroup must be a normal subgroup of the crystallographic point group of thespace group, which we refer to for convenience as a cpg-normal subgroup. …


The Bird And The Fish: Motion Field-Based Frame Interpolation In The Context Of A Story, Thomas Sterling Ellsworth Dec 2018

The Bird And The Fish: Motion Field-Based Frame Interpolation In The Context Of A Story, Thomas Sterling Ellsworth

Theses and Dissertations

Animating by hand can be a long and challenging process in part because of the necessity of drawing every frame by hand. 3D animation media minimize this problem with the use of automatically interpolated frames, but despite significant research no universally acceptable techniques have been demonstrated for 2 dimensional interpolation. In this paper we explore computer-assisted optimizations to the animation pipeline. Specifically, we utilize 3D motion fields to create more realistic in-between frames for sets of 2D ``key frames.'' We demonstrate our method by using it to create 2D special effects for a 30-second clip of an animated short film.


Toward Real-Time Flip Fluid Simulation Through Machine Learning Approximations, Javid Kennon Pack Dec 2018

Toward Real-Time Flip Fluid Simulation Through Machine Learning Approximations, Javid Kennon Pack

Theses and Dissertations

Fluids in computer generated imagery can add an impressive amount of realism to a scene, but are particularly time-consuming to simulate. In an attempt to run fluid simulations in real-time, recent efforts have attempted to simulate fluids by using machine learning techniques to approximate the movement of fluids. We explore utilizing machine learning to simulate fluids while also integrating the Fluid-Implicit-Particle (FLIP) simulation method into machine learning fluid simulation approaches.


Divisibility Properties Of Coefficients Of Modular Functions Of Genus Zero Levels, Merrill Warnick Nov 2018

Divisibility Properties Of Coefficients Of Modular Functions Of Genus Zero Levels, Merrill Warnick

Undergraduate Honors Theses

We prove divisibility results for the Fourier coefficients of canonical basis elements for the spaces of weakly holomorphic modular forms of weight 0 and levels 6, 10, 12, 18 with poles only at the cusp at infinity. In addition, we show that these Fourier coefficients satisfy Zagier duality in all weights, and give a general formula for the generating functions of such canonical bases for all genus zero levels. These results originally appeared in a paper of the same title that was accepted by the journal Integers, and was authored by the present author, with Paul Jenkins and Vicki


Clean Indices Of Common Rings, Benjamin L. Schoonmaker Nov 2018

Clean Indices Of Common Rings, Benjamin L. Schoonmaker

Theses and Dissertations

Lee and Zhou introduced the clean index of rings in 2004. Motivated by this work, Basnet and Bhattacharyya introduced both the weak clean index of rings and the nil clean index of rings and Cimpean and Danchev introduced the weakly nil clean index of rings. In this work, we calculate each of these indices for the rings ℤ/nℤ and matrix rings with entries in ℤ/nℤ. A generalized index is also introduced.


Netlight: Cloud Baked Indirect Illumination, Nathan Andrew Zabriskie Nov 2018

Netlight: Cloud Baked Indirect Illumination, Nathan Andrew Zabriskie

Theses and Dissertations

Indirect lighting drastically increases the realism of rendered scenes but it has traditionally been very expensive to calculate. This has long precluded its use in real-time rendering applications such as video games which have mere milliseconds to respond to user input and produce a final image. As hardware power continues to increase, however, some recently developed algorithms have started to bring real-time indirect lighting closer to reality. Of specific interest to this paper, cloud-based rendering systems add indirect lighting to real-time scenes by splitting the rendering pipeline between a server and one or more connected clients. However, thus far they …


Writing And Designing A Chapter On Mercury And Pluto For The Textbook Exploring The Planets (Explanet.Info), Braxton Clark Spilker Nov 2018

Writing And Designing A Chapter On Mercury And Pluto For The Textbook Exploring The Planets (Explanet.Info), Braxton Clark Spilker

Theses and Dissertations

Exploring the Planets (http://explanet.info) is a free online college textbook covering thebasic concepts of planetary science emphasizing the character and evolution of the planetarybodies in the Solar System. The latest edition (3rd edition) was published online in 2007 by EricH Christiansen. Since the release of the third edition, two important planetary missions havebeen completed: MESSENGER (to Mercury) and New Horizons (to Pluto). These missionsprovided new information and fundamental insights into these planetary bodies, which have notyet been included in Exploring the Planets. The modern results based on recent investigations ofMercury and Pluto are critical for our understanding of the nature …


Using Machine Learning To Accurately Predict Ambient Soundscapes From Limited Data Sets, Katrina Lynn Pedersen Oct 2018

Using Machine Learning To Accurately Predict Ambient Soundscapes From Limited Data Sets, Katrina Lynn Pedersen

Theses and Dissertations

The ability to accurately characterize the soundscape, or combination of sounds, of diverse geographic areas has many practical implications. Interested parties include the United States military and the National Park Service, but applications also exist in areas such as public health, ecology, community and social justice noise analyses, and real estate. I use an ensemble of machine learning models to predict ambient sound levels throughout the contiguous United States. Our data set consists of 607 training sites, where various acoustic metrics, such as overall daytime L50 levels and one-third octave frequency band levels, have been obtained. I have data for …


Fully Convolutional Neural Networks For Pixel Classification In Historical Document Images, Seth Andrew Stewart Oct 2018

Fully Convolutional Neural Networks For Pixel Classification In Historical Document Images, Seth Andrew Stewart

Theses and Dissertations

We use a Fully Convolutional Neural Network (FCNN) to classify pixels in historical document images, enabling the extraction of high-quality, pixel-precise and semantically consistent layers of masked content. We also analyze a dataset of hand-labeled historical form images of unprecedented detail and complexity. The semantic categories we consider in this new dataset include handwriting, machine-printed text, dotted and solid lines, and stamps. Segmentation of document images into distinct layers allows handwriting, machine print, and other content to be processed and recognized discriminatively, and therefore more intelligently than might be possible with content-unaware methods. We show that an efficient FCNN with …


Fully Convolutional Neural Networks For Pixel Classification In Historical Document Images, Seth Andrew Stewart Oct 2018

Fully Convolutional Neural Networks For Pixel Classification In Historical Document Images, Seth Andrew Stewart

Theses and Dissertations

We use a Fully Convolutional Neural Network (FCNN) to classify pixels in historical document images, enabling the extraction of high-quality, pixel-precise and semantically consistent layers of masked content. We also analyze a dataset of hand-labeled historical form images of unprecedented detail and complexity. The semantic categories we consider in this new dataset include handwriting, machine-printed text, dotted and solid lines, and stamps. Segmentation of document images into distinct layers allows handwriting, machine print, and other content to be processed and recognized discriminatively, and therefore more intelligently than might be possible with content-unaware methods. We show that an efficient FCNN with …


Development And Use Of Lipidomics And Proteomics Methods To Identify And Measure Pro-Survival Metabolic Pathways In Cancer, Monique Merilyn Speirs Oct 2018

Development And Use Of Lipidomics And Proteomics Methods To Identify And Measure Pro-Survival Metabolic Pathways In Cancer, Monique Merilyn Speirs

Theses and Dissertations

Throughout society’s continual war against cancer, we have attempted pharmacological intervention only to find that tumors develop modes of resistance. It is well known that genetics play an integral role in cancer. Technological advances have greatly improved our ability to study cancer biochemistry beyond the genome by measuring changes in the expression and activity of RNA, proteins, and lipids in experimental models and human patients. As our techniques and technology to perform cancer research progresses, it is becoming more evident that cancer cells develop stress tolerance mechanisms at multiple levels within the central dogma, including altering mRNA expression, enzyme concentrations, …


A Quantitative Study Of The Deployment Of The Sender Policy Framework, Eunice Zsu Tan Oct 2018

A Quantitative Study Of The Deployment Of The Sender Policy Framework, Eunice Zsu Tan

Theses and Dissertations

Email has become a standard form of communication between businesses. With the prevalent use of email as a form of communication between businesses and customers, phishing emails have emerged as a popular social engineering approach. With phishing, attackers trick users into divulging their personal information through email spoofing. Thus, it is imperative to verify the sender of an email. Anti-spoofing mechanisms such as the Sender Policy Framework (SPF) have been developed as the first line of defense against spoofing by validating the source of an email as well as the presenting options of how to handle emails that fail to …


Certificate Revocation Table: Leveraging Locality Of Reference In Web Requests To Improve Tls Certificate Revocation, Luke Austin Dickinson Oct 2018

Certificate Revocation Table: Leveraging Locality Of Reference In Web Requests To Improve Tls Certificate Revocation, Luke Austin Dickinson

Theses and Dissertations

X.509 certificate revocation defends against man-in-the-middle attacks involving a compromised certificate. Certificate revocation strategies face scalability, effectiveness, and deployment challenges as HTTPS adoption rates have soared. We propose Certificate Revocation Table (CRT), a new revocation strategy that is competitive with or exceeds alternative state-of-the-art solutions in effectiveness, efficiency, certificate growth scalability, mass revocation event scalability, revocation timeliness, privacy, and deployment requirements. The CRT periodically checks the revocation status of X.509 certificates recently used by an organization, such as clients on a university's private network. By prechecking the revocation status of each certificate the client is likely to use, the client …


Using Aviris And Machine Learning To Map And Discriminate Bull Kelp And Giant Kelp Along The Pacific Coast Of The United States, Tanner Thompson, Dr. Ryan Jensen Sep 2018

Using Aviris And Machine Learning To Map And Discriminate Bull Kelp And Giant Kelp Along The Pacific Coast Of The United States, Tanner Thompson, Dr. Ryan Jensen

Journal of Undergraduate Research

Kelp forests provide food and shelter for many organisms, and they are an important part of coastal ecosystems throughout the world. Along the Pacific coast of the United States, kelp forests are made up of two species of kelp: bull kelp (Nereocystis Leutkana) and giant kelp (Macrocystis Pyrifera). While similar, these two species are physiologically and structurally different.


Fitting Parameter Uncertainties In Least Squares Fitting, R. Steven Turley Sep 2018

Fitting Parameter Uncertainties In Least Squares Fitting, R. Steven Turley

Faculty Publications

This article review the theory and practice of computing uncertainties in the fit parameters in least squares fits. It shows how to estimate the uncertainties and gives some numerical examples in Julia of their use. Examples are given and validated for both linear and nonlinear fits.